Loading
Yanuki
ARTICLE DETAIL
Gcore Mitigates Record-Breaking 6 Tbps DDoS Attack | Drone Strikes on AWS: A Wake-Up Call for Cloud Resilience | Conduent Data Breach Balloons, Affecting Millions of Americans | Salesforce Data Breach Impacts Over 200 Companies Via Gainsight | Microsoft Mitigates Record 15.72 Tbps DDoS Attack | Malicious VS Code Extension and NPM Packages Target Developers | SentinelOne’s AI Partnerships: Redefining Cloud Security? | SonicWall Blames State-Sponsored Hackers for September Security Breach | SesameOp: Novel Backdoor Uses OpenAI Assistants API for Command and Control | Gcore Mitigates Record-Breaking 6 Tbps DDoS Attack | Drone Strikes on AWS: A Wake-Up Call for Cloud Resilience | Conduent Data Breach Balloons, Affecting Millions of Americans | Salesforce Data Breach Impacts Over 200 Companies Via Gainsight | Microsoft Mitigates Record 15.72 Tbps DDoS Attack | Malicious VS Code Extension and NPM Packages Target Developers | SentinelOne’s AI Partnerships: Redefining Cloud Security? | SonicWall Blames State-Sponsored Hackers for September Security Breach | SesameOp: Novel Backdoor Uses OpenAI Assistants API for Command and Control

Security / DDoS

Gcore Mitigates Record-Breaking 6 Tbps DDoS Attack

Gcore, a global provider of AI, cloud, network, and security solutions, has successfully mitigated one of the largest DDoS attacks ever recorded. The attack, peaking at 6 Tbps, targeted a gaming hosting provider, underscoring the increasing...

Hackers unleashed a 6 Tbps digital storm on a gaming provider
Share
X LinkedIn

ddos attack
Gcore Mitigates Record-Breaking 6 Tbps DDoS Attack Image via TechRadar

Key Insights

  • A record-breaking 6 Tbps DDoS attack targeted a gaming hosting provider.
  • The attack was attributed to the AISURU botnet, known for high-profile cyber incidents.
  • 51% of malicious traffic originated from Brazil and 24% from the United States, indicating widespread exploitation of unsecured networks.
  • The attack lasted 30-45 seconds and reached 5.3 billion packets per second using the UDP protocol.
  • Gcore’s DDoS Protection solution absorbed the flood without disruption, leveraging its global infrastructure.

In-Depth Analysis

The DDoS attack against Gcore highlights a growing trend of short-burst, high-intensity attacks designed to probe infrastructure resilience. These attacks are not only aimed at causing downtime but also at identifying vulnerabilities for potential malware infiltration or ransomware attacks.

The attack’s characteristics align with modern DDoS campaigns, emphasizing the need for adaptive mitigation strategies, edge-layer filtering, and Layer 7 behavioral analysis. Gcore’s response involved leveraging its globally distributed infrastructure across 210+ Points of Presence (PoPs) and a filtering capacity exceeding 200 Tbps.

Data from Gcore Radar report Q1-Q2 2025 indicates a 41% rise in DDoS attacks, with technology companies being the most frequent targets. The multi-regional origin and volumetric scale of the attack signal a concerning evolution of botnet capabilities, exploiting unsecured infrastructure in regions with high device density and weaker security controls.

Read source article

FAQ

What is a DDoS attack?

A Distributed Denial of Service (DDoS) attack is a malicious attempt to disrupt the normal traffic of a server, service, or network by overwhelming it with a flood of Internet traffic.

What is the AISURU botnet?

The AISURU botnet is a network of compromised computers used to launch large-scale cyberattacks, including DDoS attacks.

How can companies protect themselves from DDoS attacks?

Companies can protect themselves by implementing robust DDoS protection solutions, including adaptive mitigation strategies, edge-layer filtering, and Layer 7 behavioral analysis.

Takeaways

  • DDoS attacks are becoming more frequent and sophisticated, posing a significant threat to online services.
  • Short-burst, high-intensity attacks are increasingly common, aimed at probing infrastructure resilience.
  • Robust DDoS protection solutions are essential for maintaining uptime and preventing financial and reputational damage.
  • Organizations must adopt adaptive mitigation strategies, edge-layer filtering, and Layer 7 behavioral analysis to defend against evolving threats.

Discussion

Do you think DDoS attacks will continue to escalate? Share your thoughts in the comments below!

Share this article with others who need to stay ahead of this trend!

Sources

Disclaimer

This article was compiled by Yanuki using publicly available data and trending information. The content may summarize or reference third-party sources that have not been independently verified. While we aim to provide timely and accurate insights, the information presented may be incomplete or outdated.

All content is provided for general informational purposes only and does not constitute financial, legal, or professional advice. Yanuki makes no representations or warranties regarding the reliability or completeness of the information.

This article may include links to external sources for further context. These links are provided for convenience only and do not imply endorsement.

Always do your own research (DYOR) before making any decisions based on the information presented.